TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY,...

39
TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack Discovery APT Advanced threats Intelligence Abnormal Behavior Threat Hunting

Transcript of TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY,...

Page 1: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION

Sergey Gordeychik

Deputy CTO, Kaspersky Lab

Targeted Attack Discovery

APT Advanced threats Intelligence

Abnormal Behavior Threat Hunting

Page 2: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

The case of the

CRYPTOBANK

Page 3: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

INVESTIGATION RESULTS

3

1000 workstations, 200 servers

2 weeks of unsuccessful encryption attempts

Backups servers hacked also

FDE tool/unique encryption key for each device

PowerShell scripts…

Page 4: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

TTP

4

Enterprise wipers/cryptors

Black Energy

HDDCryptor

Shamoon 2

Full disk encryption

Malware-less

“Tailored” encryption

https://kas.pr/aAg2

Page 5: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack
Page 6: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack
Page 7: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

PowerShell scripts?..

Page 8: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

PowerShell scripts?..

Page 9: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

INVESTIGATION RESULTS

9

The initial breach occurred 6 months before

Spear phishing “from” [email protected]

Cobalt Strike beacon

Privilege escalation (Mimikatz, Pass-the-Hash)

Access to ATM management station

Silence…

Page 10: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

15 countries

Near East

Asia

East/West Europe

Russia

40+ banks

XFS ATM withdraw

sdelete.exe wipe

“Offensive Security Certified” hacking

Page 11: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

CYBER THREAT VELOCITY

https://www.youtube.com/watch?v=e50DpEvKJ-k

Page 12: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

TECHNIQUES, TACTICS AND PROCEDURES

12

Pentest-style attack

Massive breach post processing

Targets selection and profiling

Black market

Remote access

Insiders

Passwords

Drops

Organized activity

Page 13: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

http://www.scmagazine.com/kaspersky-confirms-return-of-carbanak-and-two-more-banking-apt-groups/article/472224/ https://en.wikipedia.org/wiki/2016_Bangladesh_Bank_heist https://www.elevenpaths.com/wp-content/uploads/2016/11/Financial_Threats_Q3-2016_EN.pdf https://www.bleepingcomputer.com/news/security/polish-banks-infected-with-malware-hosted-on-their-own-governments-site/

Page 14: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

THREAT VELOCITY

ATM

+15 Countries

Swift

Poland

..

Local payment systems

We don’t know yet…

Page 15: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

The case of the

https://www.proofpoint.com/us/threat-insight/post/APT-targets-russia-belarus-zerot-plugx

Page 16: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

OOPS, THEY DID IT AGAIN

16

Domain controllers under control since 2013

psexec for lateral movement

Steganography for C2 communications

Checks for (only) Qihoo 360 AV

3 days for ”do it again” after cleanup

• Trusted domain in daughter company

• Overseas branch

• Backdoor VPN channel

Page 17: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

THEY NETHER GIVE UP

17

You don't have to be a target to be a

victim

Supply chain attack

Multiply C2 channel

Malware-less attacks

Server side implants

Taidoor/ Whitewhile

Poisoned Flight/Elirks

PlugX/ ZeroT

TropicTrooper

Page 18: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

https://www.hackread.com/mirai-botnet-linked-to-dyn-dns-ddos-attacks/

Page 19: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

http://census2012.sourceforge.net/paper.html

Page 20: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

A THOUSAND BATTLES, A THOUSAND VICTORIES

Page 21: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

THREAT HUNTING

21

https://sqrrl.com/solutions/cyber-threat-hunting/

Cyber threat hunting is

the practice of

searching iteratively

through data to detect

advanced threats that

evade traditional

security solutions.

Page 22: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

WHY THREAT HUNTING?

22

Minimize residual risks

Minimize time between attack and detection

Unknown targeted attacks detection

TTP based detection

“Time machine” for evidence analysis

Non-malware attacks detection

Iteratively process

Se

curi

ty T

oo

ls

Mo

nit

ori

ng

H

un

tin

g

Prevention

Threat hunting

SOC Alerting

Risks

Page 23: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf

https://www.sans.org/reading-room/whitepapers/analyst/who-what-where-when-effective-threat-hunting-36785

http://info.isightpartners.com/definitive-guide

Eric M. Hutchins∗ , Michael J. Cloppert† , Rohan M. Amin, Ph.D.‡ Lockheed Martin Corporation

Page 24: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf

https://www.sans.org/reading-room/whitepapers/analyst/who-what-where-when-effective-threat-hunting-36785

http://info.isightpartners.com/definitive-guide

Eric M. Hutchins∗ , Michael J. Cloppert† , Rohan M. Amin, Ph.D.‡ Lockheed Martin Corporation

Page 25: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

FROM THE OTHER SIDE OF THE FENCES

https://securelist.com/blog/virus-watch/74150/plugx-malware-a-good-hacker-is-an-apologetic-hacker/

Page 26: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

SANS 2016 (THREAT HUNTING, MDR*)

Page 27: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

https://www.sans.org/reading-room/whitepapers/threats/automated-defense-threat-intelligence-augment-35692

DAVID BIANCO - PYRAMID OF PAIN

Page 28: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

https://securelist.com/blog/research/77403/fileless-attacks-against-enterprise-networks/

Page 29: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

WHAT DO WE NEED/HAVE?

Hypothesis

Security assessment

SOC practice

APT/Breach reports

Situational awareness

Analytics

Machine learning

Linked data analysis

IOC

Data feeds: MAF, C&C, pDNS, etc.

White lists

Popularity

Similarity

https://www.gartner.com/doc/reprints?id=1-2WQY2BI&ct=160121&st=sb

Page 30: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

THREAT HUNTING CYCLE

Goals Priorities

Detect scenarios

Scenarios deploymen

t

Detection Evidence collection

Data analysis

Validation

Categorization

Prioritization

Live response

Memory dump

Disk dump

Malware analysis

Live response analysis

Forensic examination

Network forensics

Host forensics

Page 31: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

THREAT HUNTING (PAIN) CYCLE

Goals Priorities

Detect scenarios

Scenarios deploymen

t

Detection Evidence collection

Data analysis

Validation

Categorization

Prioritization

Live response

Memory dump

Disk dump

Malware analysis

Live response analysis

Forensic examination

Network forensics

Host forensics

How to deliver quickly?

How and with what to detect? TP or FP?

“tailored” for me or seen before? Is this really important?

How? Tools to use?

What really has happened? How to withstand in the

future?

Who? How and with

what? Attack goals?

Page 32: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

IMPLEMENTATION: THREAT INTELLIGENCE PLATFORM

32

Page 33: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

Leve 1: TI Farm

pDNS

Files IoC

C&C

Distributed SandBox

Ext. IoCs

Level 2: TTP

ML

Objects (MD5, FQDN)

Events

SOC practice

IR, DF

Security Assessment

Objects behavior (system, network,

identity)

Object tags

Manual analysis

Suspicions objects Suspicious behavior

Level 3: Analyst

Sandbox/КАТА

AV

IR team

WL

APT Hunt

Automatic analysis

Exploit detection

THREAT HUNTING FUNNEL

Page 34: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

CYBER THREAT HUNTING ”TOOLKIT”

34

Intelligence

• TTP: Incident Response/Pentest cases

• MRTI: Feeds

Sensors

• Host

• Network

• Infrastructure

• Apps

Collection and analysis

• Collection cloud

• Storage

• Analytical engine(s)

Threat Hunting Team

Page 35: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

SOC/IR/THREAT HUNTING

Goals Priorities

Detect scenarios

Scenarios deploymen

t

Detection Evidence collection

Data analysis

Validation

Categorization

Prioritization

Live response

Memory dump

Disk dump

Malware analysis

Live response analysis

Forensic examination

Network forensics

Host forensics

Threat Hunting

Incident Response

Monitoring

Page 36: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

THREAT HUNTING…

36

Helps to detect new threats

On the top of SOC

TTP based detection

“Time machine”

Non-malware attacks

Iteratively process

Pain cycle

https://www.linkedin.com/pulse/threat-hunting-reference-model-part-2-loop-ely-kahn

Page 37: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

37

Know the enemy

Know you self

Follow tends

Use what you have

Looks forward

Remember the past

Hunt the hunters

Page 38: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

SILENCE IS A SCARY SOUND

Page 39: TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION · TARGETED CYBER ATTACKS ANATOMY, VIVISECTION AND PROTECTION Sergey Gordeychik Deputy CTO, Kaspersky Lab Targeted Attack

BE SAFE! Sergey Gordeychik

[email protected]

@scadasl

Targeted Attack Discovery

APT Advanced threats IT issues

Abnormal Behavior Internal threats